Skip to main content

SOC 2 Trust Service Criteria — Controls Matrix

Last updated: April 2026

info

This document maps SOC 2 Trust Service Criteria to technical controls implemented in FeatureSignals. This is a controls mapping exercise, not evidence of a completed SOC 2 audit or certification. A formal SOC 2 Type II audit is on our roadmap.

This document maps SOC 2 Trust Service Criteria to FeatureSignals technical controls.

CC1 — Control Environment

CriteriaControlImplementation
CC1.1Organizational commitment to integrityCode of conduct, security policy
CC1.2Board oversightQuarterly security reviews
CC1.3Management accountabilityRole-based access control (RBAC)
CC1.4Competence requirementSecurity training program
CC1.5Accountability for controlsAudit logging with tamper-evident hashing

CC2 — Communication and Information

CriteriaControlImplementation
CC2.1Internal communicationStructured logging (slog), audit trail
CC2.2External communicationPrivacy policy, DPA, trust page
CC2.3Communication about securityIncident response plan, responsible disclosure

CC3 — Risk Assessment

CriteriaControlImplementation
CC3.1Risk objectivesRisk register (docs/compliance/iso27001/)
CC3.2Risk identificationVulnerability scanning (govulncheck, npm audit, Trivy)
CC3.3Fraud riskLogin anomaly detection, brute-force protection
CC3.4Change impactChange management process, PR reviews

CC5 — Control Activities

CriteriaControlImplementation
CC5.1Control activitiesAutomated CI/CD pipeline with testing
CC5.2Technology controlsRate limiting, input validation, CSP headers
CC5.3Policy deploymentInfrastructure as Code (Helm, Terraform)

CC6 — Logical and Physical Access

CriteriaControlImplementation
CC6.1Logical accessJWT authentication, API key authentication
CC6.2Access provisioningRBAC (owner/admin/developer/viewer), SSO/SCIM
CC6.3Access removalTeam member removal, API key revocation
CC6.4Access restrictionsPer-environment permissions, feature gates
CC6.5AuthenticationMFA (TOTP), SSO (SAML/OIDC), password policies
CC6.6Access controlsIP allowlisting, rate limiting
CC6.7Information protectionTLS 1.3, AES-256 at rest, bcrypt passwords
CC6.8Malicious softwareContainer scanning, dependency vulnerability checks

CC7 — System Operations

CriteriaControlImplementation
CC7.1MonitoringStructured logging, metrics collection, health checks
CC7.2Anomaly detectionLogin attempt tracking, rate limit monitoring
CC7.3Security eventsAudit log with IP/user agent, integrity hashing
CC7.4Incident responseIncident response plan, on-call procedures
CC7.5RecoveryBackup procedures, disaster recovery runbook

CC8 — Change Management

CriteriaControlImplementation
CC8.1Change managementGit-based workflow, PR reviews, CI/CD
CC8.2Change testingAutomated test suite (80%+ coverage), staging environment
CC8.3Change approvalRequired code reviews, protected branches

CC9 — Risk Mitigation

CriteriaControlImplementation
CC9.1Risk mitigationCircuit breakers, graceful degradation, retry with backoff
CC9.2Vendor managementSub-processor list, vendor security assessments